勒索軟體

連接病毒 (.連結文件) 勒索軟體

什麼是維札病毒?

The Veza virus is like a bad magic spell that locks up files on computers so you can’t use them. It changes the names of files by adding “.vezaat the end, which means you can’t open them without a special key.

When Veza gets into a computer, it asks for money, paid in Bitcoin, to unlock the files. It leaves a note called_readme.txton the desktop and in folders telling you how to pay the money. But even if you pay, there’s no promise your files will be unlocked.

The virus uses a tricky lock called the Salsa20 encryption algorithm that makes it very hard to open the files without the bad guy’s help. But if the Veza virus couldn’t talk to its home base before it locked the files, it uses a simpler lock that might be easier to open.

Below, an image shows what the locked files look like, marked by the “.veza” 擴大:

Veza files

Encrypted Files by Veza Ransomware

NameVeza Virus
Family 1STOP/Djvu Ransomware
Extension.veza
勒索軟體說明_readme.txt
贖金從 $499 到 $999 (比特幣)
接觸support@freshingmail.top, datarestorehelpyou@airmail.cc
症狀
  • 加密您的大部分文件 (相片, 影片, 文件) 並且添加了一個特定的 “.veza” 擴大;
  • 刪除影集副本,使受害者無法嘗試恢復數據;
  • 將網域清單新增至 HOSTS 檔案以阻止對某些安全性相關網站的訪問;
  • 在系統上安裝竊取密碼的木馬, 像 Vidar Stealer 或 RedLine Stealer;
  • 設法安裝一個 SmokeLoader後門;
恢復從全面的恢復開始 防病毒掃描. 雖然並非所有文件都可以恢復, 我們的指南概述了重新獲得加密文件存取權的幾種潛在方法.

Veza Virus Overview

When the Veza virus gets onto a computer, it starts doing a lot of sneaky things. 第一的, it pretends to be a Windows update with a fake message from a program called winupdate.exe to trick the computer user into thinking everything is normal.

At the same time, it runs another secret program that starts looking for important files on the computer to lock them up. It also uses a special command:

vssadmin.exe Delete Shadows /All /Quiet

This command stops the computer from being able to go back to how it was before the virus, which means you can’t easily fix what the virus changes.

The virus also messes with a list on the computer that helps it find websites. It changes this list so some websites don’t work anymore, especially sites that could help fix the computer or give advice about the virus. It does this by making the computer think these websites are just on your computer and nowhere else, which isn’t true.

The virus also leaves behind two text files on the computer that have secret codes related to the attack – these are called bowsakkdestx.txt and PersonalID.txt.

But that’s not all. This virus can also sneak in another bad program called Vidar, which can steal passwords and other private stuff from the computer. Here’s what Vidar can do:

  • Put other bad programs on the computer.
  • Steal passwords from programs like Steam, Telegram, and Skype.
  • Look at and change files without you knowing.
  • Steal digital money wallets.
  • Let hackers control the computer from far away.
  • Take private info like the websites you visit and your saved passwords.

The Veza virus uses a super tough lock called Salsa20 to keep files locked up. If it locks your files with a special key only it knows, it’s really hard to unlock them again. Each key is different for everyone, making it nearly impossible to guess.

If you want to get the key to unlock your files, the hackers ask for $999. They tell you to email them at (support@fishmail.top) to find out how to pay them.

Ransom Note: _readme.txt

Ransom Note: _readme.txt

How To Remove?

Remove Veza Virus with Gridinsoft Anti-Malware

從那時起我們就一直在我們的系統上使用這個軟體, 而且在檢測病毒方面一直很成功. 它阻止了最常見的勒索軟體: 從我們的測試中可以看出 與軟體, and we assure you that it can remove Veza Virus as well as other malware hiding on your computer.

Gridinsoft 反惡意軟體 - 主螢幕

使用 Gridinsoft 刪除惡意威脅, 請依照以下步驟操作:

1. 首先下載 Gridinsoft Anti-Malware, 透過下面的藍色按鈕或直接從官方網站訪問 網格軟體.

2.一旦 Gridinsoft 安裝文件 (安裝-gridinsoft-fix.exe) 已下載, 透過點擊該檔案來執行它. Follow the installation setup wizard's instructions diligently.

Gridinsoft 設定精靈

3. 訪問 "掃描選項卡" on the application's start screen and launch a comprehensive "全碟掃描" 檢查您的整台計算機. 這種包容性掃描涵蓋了內存, 啟動項, 註冊表, 服務, 司機, 和所有文件, 確保它檢測到隱藏在所有可能位置的惡意軟體.

Scan for Veza Virus Ransomware

要有耐心, as the scan duration depends on the number of files and your computer's hardware capabilities. 利用這段時間放鬆或處理其他任務.

4. 完成後, 反惡意軟體將提供一份詳細報告,其中包含您 PC 上偵測到的所有惡意專案和威脅.

The Veza Virus was Found

5. 從報告中選擇所有已識別的項目,然後放心地單擊 "立即清潔" 按鈕. 此操作將從您的電腦中安全地刪除惡意文件, 將它們轉移到反惡意軟體程式的安全隔離區,以防止任何進一步的有害行為.

The Veza Virus has been removed

6. 如果出現提示, 重新啟動電腦以完成完整的系統掃描過程. 此步驟對於確保徹底消除任何剩餘威脅至關重要. 重啟後, Gridinsoft Anti-Malware 將會開啟並顯示一則訊息,確認 掃描完成.

請記住 Gridinsoft 提供 6 天免費試用. 這意味著您可以免費利用試用期體驗軟體的全部優勢,並防止您的系統將來受到任何惡意軟體感染. Embrace this opportunity to fortify your computer's security without any financial commitment.

影片指南

How To Decrypt .veza Files?

第一的, 嘗試刪除 “.veza” 幾個大檔案的副檔名,然後打開它們. 該惡意軟體難以加密大文件. The virus either failed to lock the file upon access or encountered a bug and omitted adding the file marker. 如果您的檔案大小超過 2GB, 後一種情況更有可能發生.

犯罪分子在八月底左右發布了最新的擴展 2019 進行多次更改後.

犯罪分子所做的更改使 STOPDecrypter 不再受支持, 導致其被 Emsisoft 開發的 STOP Djvu 勒索軟體 Emsisoft Decryptor 取代.

  1. 下載並執行解密工具: 下載 解密工具. 確保您以管理員身份執行解密實用程式並同意透過點擊出現的授權條款 “是的” 按鈕. 接受許可條款後.
  2. 選擇要解密的資料夾: 解密器, 預設情況下, 自動選擇已連接的網路磁碟機上的目錄進行解密. 使用 “添加” 按鈕選擇其他位置. Depending on the malware family, decryptors offer various options, which you can toggle on or off in the Options tab. Below, you will find a detailed list of the currently active options.
  3. Initiate Decryption by Clicking on theDecryptButton. After adding all desired locations to the list, click theDecryptbutton to start the decryption process. The decryptor will inform you upon completing the decryption process. If needed for documentation, you can save the report by clicking theSave log” 按鈕. It’s also possible to copy the report to your clipboard for pasting into emails or messages.

How to Restore .veza Files?

In some case, ransomware fails to encrypt your files

The Veza ransomware encryption process involves encrypting each file byte-by-byte, creating a duplicate, and then deleting (not overwriting) the original file. This deletion means the physical disk no longer lists the file in its system, although the original file remains on the drive. The sector that held the file might still contain it, but since the system does not list it, new data can overwrite it. However, special software can recover your files.

Solution 1Solution 2
This virus managed to bypass two antivirus programs and two malware fighters and infect my PC.

Realizing it was an online algorithm, I knew recovering my encrypted files was impossible. My backup drive, connected during the infection, seemed infected as well. Every folder on my backup drive appeared encrypted. Despite this, I managed to recover nearly 80% of my 2TB storage.

Examining the folders, I found ransom notes in each. 打開一些發現只有不在子資料夾中的檔案被加密. Delving into subfolders on other folders, 我發現了未加密的文件. 不像我的 C 盤和 D 盤,每個資料夾, 包括子資料夾, 已加密, 我的備份磁碟機的子資料夾已儲存 80% 我的數據.

我認為在我的備份驅動器上發現這個漏洞很幸運. 另外, 我又找回了一個 10% 我的數據來自另一台 PC 上的硬碟. 因此, 我對使用備份磁碟機的建議是建立子資料夾. 部分是運氣, 但不幸的是,在我的備份檔案傳輸過程中病毒襲擊了.

希望這段經歷可以幫助其他有類似困境的人.

傑米紐蘭
Here are some tips for Veza file recovery and repair (適用於所有 STOP/DJVU 變體):

  • 檢查更深的嵌套資料夾,因為某些 Stop/Djvu 變體無法加密它們, 讓它們不加密.
  • 由於該勒索軟體將加密資料保存到新文件並刪除原始文件, 有機會使用文件恢復軟體恢復已刪除文件的部分內容. 雖然恢復資料夾結構的可能性不大, 像 PhotoRec 這樣的工具可能會很好.
  • 勒索軟體部分加密文件 (關於第一個 150 知識庫), 可以根據檔案大小和類型恢復未加密部分.
  • 喬普
    布倫丹·史密斯
    布倫丹·史密斯
    IT安全專家
    試試使用 GridinSoft 反惡意軟體
    不要忘記分享您解決問題的經驗. 請在此發表評論! 這可以幫助其他受害者了解他們並不孤單. 我們將共同找到解決這個問題的方法.
    反惡意軟體
    Gridinsoft Anti-Malware 6-day trial available.
    EULA | 隱私權政策 | 10% Off Coupon

    Recover Your Files with PhotoRec

    PhotoRec, designed for file recovery from damaged disks or accidental deletion, now supports restoring 400 file types, making it useful after a Veza attack.

    第一的, download PhotoRec. It’s free, but the developer offers no guarantee for file restoration. PhotoRec comes packaged with TestDisk, another tool from the same developer, under the TestDisk name. However, PhotoRec is included within the archive.

    To start PhotoRec, open the qphotorec_win.exe 文件. 無需安裝,因為該程式包含所有必需的文件, 允許它從 USB 驅動器運行.

    1. My files are encrypted by ransomware, what should I do now?

    About the author

    布倫丹·史密斯

    I'm Brendan Smith, a passionate journalist, researcher, and web content developer. With a keen interest in computer technology and security, I specialize in delivering high-quality content that educates and empowers readers to navigate the digital landscape.

    Focused on computer technology and security, I am committed to sharing my knowledge and insights to help individuals and organizations protect themselves in the digital age. My expertise in cybersecurity principles, data privacy, and best practices enables me to provide practical tips and advice that readers can implement to enhance their online security.

    Leave a Comment